Home | Amazing | Today | Tags | Publishers | Years | Search 
Strategies for Knowledge Management Success: Exploring Organizational Efficacy (Premier Reference Source)
Strategies for Knowledge Management Success: Exploring Organizational Efficacy (Premier Reference Source)

Knowledge management captures the right knowledge, to the right user, who in turn uses the knowledge to improve organizational or individual performance to increase effectiveness. Strategies for Knowledge Management Success: Exploring Organizational Efficacy collects and presents key research articles focused on identifying, defining, and...

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Penetration testers are faced with a combination of firewalls, intrusion detection systems, host-based protection, hardened systems, and teams of knowledgeable analysts that pour over data collected by their security information management systems. In an environment such as this, simply running automated tools will typically...
Image Registration: Principles, Tools and Methods (Advances in Computer Vision and Pattern Recognition)
Image Registration: Principles, Tools and Methods (Advances in Computer Vision and Pattern Recognition)
Image registration is the process of finding correspondence between all points in two images of a scene. This correspondence is required in stereo depth perception, 3-D scene reconstruction, object detection and recognition, change detection, image fusion, object tracking and motion analysis. Analysis of two or more images of a...
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)

From time immemorial, the security realm and personal identification task had shown progress by employing technological means like secret knowledge as passwords and Personal Identification Numbers, and by using personal possessions as identity cards and Radio Frequency Identification chips. As opposed to these means which are...

Theory and Applications of Models of Computation: Third International Conference, TAMC 2006, Beijing, China
Theory and Applications of Models of Computation: Third International Conference, TAMC 2006, Beijing, China

In several practical circumstances we have to solve a problem whose instance is not a priori completely known. Situations of this kind occur in computer systems and networks management, in financial decision making, in robotics etc. Problems that have to be solved without a complete knowledge of the instance are called on-line...

Engineering Noise Control: Theory and Practice
Engineering Noise Control: Theory and Practice

The third edition of Engineering Noise Control has been thoroughly revised, updated and extended. Each chapter contains new material, much of which is not available elsewhere. The result is a comprehensive discussion of the theoretical principles and concepts of acoustics and noise control, a detailed discussion of the hearing...

Pharmaceutical Compounding and Dispensing
Pharmaceutical Compounding and Dispensing

Pharmacists or their pharmaceutical equivalents have been responsible for compounding medicines for cen turies. Recently this role has been challenged in the pharmaceutical literature with suggestions and recom mendations that it is inappropriate for the pharmaceu tical practitioner to compound medicines in a local pharmacy...

SOA Governance: Governing Shared Services On-Premise and in the Cloud
SOA Governance: Governing Shared Services On-Premise and in the Cloud

The Definitive Guide to Governing Shared Services and SOA Projects

 SOA Governance: Governing Shared Services On-Premise and in the Cloud is the result of a multi-year project to collect proven industry practices for establishing IT governance controls specific to the adoption of SOA...

Practical Oracle Security: Your Unauthorized Guide to Relational Database Security
Practical Oracle Security: Your Unauthorized Guide to Relational Database Security

A senior database manager at one of the world’s largest banks once told me that the best way to secure Oracle is to unplug it from the wall…and he is probably right. In fact, this holds true for nearly every networked application. Unfortunately, for many of us turning off the database is not an option; we must find another way to...

Social Media Marketing All-in-One For Dummies
Social Media Marketing All-in-One For Dummies

Everything your business needs for a successful social media campaign

Facebook, LinkedIn, and Twitter are today's hottest marketing tools. This all-in-one guide by an expert on social media strategy helps you take full advantage of them in creative new ways.

Lena West is a consultant who helps her clients...

Workshop Processes, Practices and Materials, Fourth Edition
Workshop Processes, Practices and Materials, Fourth Edition

Workshop Processes, Practices and Materials is an ideal introduction to workshop processes, practices and materials for entry level engineers and workshop technicians.

With detailed illustrations throughout, and simple, clear language, this is a practical, one book introduction to what can be a very complex subject.

...

CCTV, Second Edition: Networking and Digital Technology
CCTV, Second Edition: Networking and Digital Technology

Closed circuit television (CCTV) is experiencing a leap in technology using digital techniques and the Internet. The new edition of this high-level professional reference retains the particulars that made the first edition a success, including the details of CCD cameras, lenses, coaxial cables, fiber-optics, and system design, but it is...

Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy